Category: Featured

Growing cloud complexity creates MSP opportunity
More organizations than ever are employing multiple cloud service providers, but with the addition of each cloud platform, concerns about cost appear to correspondingly increase. A survey of 350 IT leaders in the U.S. and United Kingdom conducted by Virtana,...

Tech Time Warp: Kodak plays for KEEPS
Eastman Kodak’s major product announcements on May 29, 1985, remind us yet again of how far we’ve come in less than 40 years. The New York Times, The Washington Post and Associated Press all covered Kodak’s news about KEEPS (short...

How MSPs can prosper with pricing, incentives, and deals
Customers like known costs when it comes to MSP contracts. They tend to dislike the use of variables such as resource or time charges, preferring either per user or per organization charging instead. While this can work for the MSP...

Pioneers in Tech: Kao Chung-chin and Lois Lew, who brought IBM’s typewriter to China
In today’s globalized, always-connected society, another innovation we take for granted is the universality of computers despite language differences. And some of us in English-speaking countries will even go a step further and assume computers all over the world have...

MSPs can create value amid growing cloud costs
A survey of 100 vice presidents from organizations with more than 1,000 employees suggests a need for increased visibility into cloud spending. This has become a major opportunity for managed service providers (MSPs) that have cloud expertise. Conducted by Vega...

Voice cloning – a growing cybersecurity threat
Just when you think you’re reasonably on top of all the cyberthreats out there, new ones emerge. Say hello to voice cloning. Or don’t say hello to it because you don’t want a scammer to have your voice. Voice cloning made...

Cybersecurity Threat Advisory: Critical PaperCut vulnerability actively exploited
A new vulnerability, CVE-2023-27350, has been discovered which affects PaperCut MF and NG print management software. Successful exploitation of the vulnerability would allow attackers to access sensitive user information (usernames, email addresses, office/department information, and card numbers) without authentication. A...

Tech Time Warp: Could I have email, texts, and spam, without the spam?
This week’s Tech Time Warp is all about “spam.” Spam can now be used as a noun or verb and even has an adjectival form: “spammy.” And to think, not long ago it was solely canned meat! So how did...